• DocumentCode
    1707802
  • Title

    Next generation SCADA security: best practices and client puzzles

  • Author

    Bowen, Calvert L., III ; Buennemeyer, Timothy K. ; Thomas, Ryan W.

  • Author_Institution
    Bradley Dept. of Electr. & Comput. Eng., Virginia Polytech. Inst. & State Univ., USA
  • fYear
    2005
  • Firstpage
    426
  • Lastpage
    427
  • Abstract
    Supervisory control and data acquisition (SCADA) systems are found throughout the public utility industry. As part of our national critical infrastructure, SCADA systems are used to monitor, control and manage spatially separated utility sites. SCADA systems are mirroring the rapid changes occurring in the larger information technology (IT) and networking industry by becoming more flexible and at the same time more interconnected. These primitive systems are being upgraded using commercial-off-the-shelf (COTS) hardware and software, and are being migrated to standard data formats and network protocols, particularly transport control protocol (TCP) for end-to-end control. Throughout this transition, SCADA system networks must be well defended and maintain the level of service required by their customers.
  • Keywords
    SCADA systems; data structures; public utilities; security of data; transport protocols; SCADA security; TCP; data format; end-to-end control; information technology; management; monitoring; network protocol; networking industry; public utility industry; spatially separated utility sites; supervisory control and data acquisition; transport control protocol; Best practices; Control systems; Data security; Electrical equipment industry; Industrial control; Information technology; Monitoring; National security; SCADA systems; Transport protocols;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Assurance Workshop, 2005. IAW '05. Proceedings from the Sixth Annual IEEE SMC
  • Print_ISBN
    0-7803-9290-6
  • Type

    conf

  • DOI
    10.1109/IAW.2005.1495984
  • Filename
    1495984